Описание
SGLangs replay_request_dump.py contains an insecure pickle.load() without validation and proper deserialization
SGLangs replay_request_dump.py contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2026-3989
- https://github.com/sgl-project/sglang/pull/20904
- https://github.com/sgl-project/sglang/blob/main/scripts/playground/replay_request_dump.py
- https://github.com/sgl-project/sglang/releases/tag/v0.5.10
- https://orca.security/resources/blog/sglang-llm-framework-rce-vulnerabilities
Пакеты
Наименование
sglang
pip
Затронутые версииВерсия исправления
<= 0.5.9
0.5.10
Связанные уязвимости
CVSS3: 7.8
nvd
около 1 месяца назад
SGLangs `replay_request_dump.py` contains an insecure pickle.load() without validation and proper deserialization. An attacker can take advantage of this by providing a malicious .pkl file, which will execute the attackers code on the device running the script.